Analysis

  • max time kernel
    113s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2024, 07:40

General

  • Target

    df256e198f411951c578cf19ef02bb70N.exe

  • Size

    32KB

  • MD5

    df256e198f411951c578cf19ef02bb70

  • SHA1

    4338464d3c17d20588612deed26ee79028c59ad2

  • SHA256

    681e4c359b4b60dc171f5b494efc041e7ee6dd63217f7f91e576a8c5ed7bb779

  • SHA512

    bf89fb24b745299c04ccfa649a25f67d1c01fda75d38d4079b578d1503664661b7a39dc6b22f25e91c222f06d979194747a676ea7d3f2b79c6fe7990046ca78a

  • SSDEEP

    768:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJhATNydWK9WKF9ADJ59ADJsmrH:CTW7JJZENTNyoKIKMmrH

Malware Config

Signatures

  • Renames multiple (369) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\df256e198f411951c578cf19ef02bb70N.exe
    "C:\Users\Admin\AppData\Local\Temp\df256e198f411951c578cf19ef02bb70N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2244

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

    Filesize

    32KB

    MD5

    6ecfa9c3233fbb6b75e0564803b4ebd9

    SHA1

    1188416475197c18bb2b9c6f6e766eeb78d0d6b4

    SHA256

    a6176687c48a075000c8cadda225d08332c4c83a15e3a35cd83e3b63be9ac553

    SHA512

    836cec8a01c32ca9cbee7d3dec36d1e34a29623ef229a7a46c813d96eb56be829946db1c55b1b0d9f0daf630637881e9e5ebbcb592766e7fb39acfccef2a1ad1

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    41KB

    MD5

    3ee9d24ebe58705bf3cf62a3bffbdb38

    SHA1

    1d576d473739d944b7a483cfe2dc4a028a0cc249

    SHA256

    b7f394733ec5f1d594c2abc4469f0cc281c824d5ce8b8ff4bd62dd0e1f16145c

    SHA512

    1f16a9b7dc3b87d6b6efbe586ebabd7db48431089c3d7b80ba80fd42ac42eededccaa928df78ae647cd0bd1912b831b425d4cc09004cc08a874e1d38671d9d04

  • memory/2244-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2244-26-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB